{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T17:23:07Z","timestamp":1763054587051,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":30,"publisher":"ACM","funder":[{"name":"Information & Communications Technology Planning & Evaluation","award":["RS-2025-02217656"],"award-info":[{"award-number":["RS-2025-02217656"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,13]]},"DOI":"10.1145\/3733811.3767314","type":"proceedings-article","created":{"date-parts":[[2025,9,22]],"date-time":"2025-09-22T16:20:28Z","timestamp":1758558028000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["High-Throughput AES Transciphering using CKKS: Less than 1ms"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6870-4504","authenticated-orcid":false,"given":"Youngjin","family":"Bae","sequence":"first","affiliation":[{"name":"CryptoLab Inc., Seoul, Republic of Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7085-2220","authenticated-orcid":false,"given":"Jung Hee","family":"Cheon","sequence":"additional","affiliation":[{"name":"Seoul National University, CryptoLab Inc., Seoul, Republic of Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0000-2125-5043","authenticated-orcid":false,"given":"Minsik","family":"Kang","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, Republic of Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0009-0007-9947-0377","authenticated-orcid":false,"given":"Taeseong","family":"Kim","sequence":"additional","affiliation":[{"name":"Seoul National University, Seoul, Republic of Korea"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2025,10,13]]},"reference":[{"volume-title":"Lattigo v6. Online: https:\/\/github.com\/tuneinsight\/lattigo. (Aug","year":"2024","unstructured":"2024. Lattigo v6. Online: https:\/\/github.com\/tuneinsight\/lattigo. (Aug. 2024). EPFL-LDS, Tune Insight SA.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","volume-title":"Paper 2023\/1040.","author":"Aharoni Ehud","year":"2023","unstructured":"Ehud Aharoni, Nir Drucker, Gilad Ezov, Eyal Kushnir, Hayim Shaul, and Omri Soceanu. 2023. E2E near-standard and practical authenticated transciphering. Cryptology ePrint Archive, Paper 2023\/1040. (2023)."},{"key":"e_1_3_2_1_3_1","volume-title":"On the concrete hardness of Learning with Errors. Journal of Mathematical Cryptology 9 (10","author":"Albrecht Martin","year":"2015","unstructured":"Martin Albrecht, Rachel Player, and Sam Scott. 2015. On the concrete hardness of Learning with Errors. Journal of Mathematical Cryptology 9 (10 2015)."},{"key":"e_1_3_2_1_4_1","volume-title":"Jaehyung Kim, and Damien Stehl\u00e9.","author":"Bae Youngjin","year":"2024","unstructured":"Youngjin Bae, Jung Hee Cheon, Jaehyung Kim, and Damien Stehl\u00e9. 2024. Bootstrapping Bits with CKKS. In EUROCRYPT 2024. Springer Nature Switzerland, Cham, 94--123."},{"key":"e_1_3_2_1_5_1","volume-title":"ASIACRYPT","author":"Bae Youngjin","year":"2024","unstructured":"Youngjin Bae, Jaehyung Kim, Damien Stehl\u00e9, and Elias Suvanto. 2025. Bootstrapping Small Integers With CKKS. In ASIACRYPT 2024. Springer Nature Singapore, Singapore, 330--360."},{"key":"e_1_3_2_1_6_1","volume-title":"Further Improvements in AES Execution over TFHE. IACR Communications in Cryptology 2 (04","author":"Bela\u00efd Sonia","year":"2025","unstructured":"Sonia Bela\u00efd, Nicolas Bon, Aymen Boudguiga, Renaud Sirdey, Daphn\u00e9 Trama, and Nicolas Ye. 2025. Further Improvements in AES Execution over TFHE. IACR Communications in Cryptology 2 (04 2025)."},{"key":"e_1_3_2_1_7_1","volume-title":"Optimized homomorphic encryption solution for secure genome-wide association studies. BMC Medical Genomics 13 (07","author":"Blatt Marcelo","year":"2020","unstructured":"Marcelo Blatt, Alexander Gusev, Yuriy Polyakov, Kurt Rohloff, and Vinod Vaikuntanathan. 2020. Optimized homomorphic encryption solution for secure genome-wide association studies. BMC Medical Genomics 13 (07 2020)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_8_1","DOI":"10.46586\/tches.v2024.i3.302-341"},{"volume-title":"Applied Cryptography and Network Security","author":"Bossuat Jean-Philippe","unstructured":"Jean-Philippe Bossuat, Juan Troncoso-Pastoriza, and Jean-Pierre Hubaux. 2022. Bootstrapping for Approximate Homomorphic Encryption with Negligible Failure-Probability by Using Sparse-Secret Encapsulation. In Applied Cryptography and Network Security. Springer International Publishing, Cham, 521--541.","key":"e_1_3_2_1_9_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_10_1","DOI":"10.1007\/978-3-642-32009-5_50"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/2090236.2090262"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1007\/978-3-030-64840-4_2"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1007\/978-3-319-70694-8_15"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1007\/978-3-662-53887-6_1"},{"key":"e_1_3_2_1_15_1","volume-title":"Paper 2024\/274.","author":"Chung Heewon","year":"2024","unstructured":"Heewon Chung, Hyojun Kim, Young-Sik Kim, and Yongwoo Lee. 2024. Amortized Large Look-up Table Evaluation with Multivariate Polynomials for Homomorphic Encryption. Cryptology ePrint Archive, Paper 2024\/274. (2024)."},{"unstructured":"HEaaN. CryptoLab. 2022. HEaaN library. https:\/\/www.cryptolab.co.kr\/en\/products-en\/heaan-he\/. (2022).","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","article-title":"BLEACH: Cleaning Errors in Discrete Computations Over CKKS","author":"Drucker Nir","year":"2023","unstructured":"Nir Drucker, Guy Moshkowich, Tomer Pelleg, and Hayim Shaul. 2023. BLEACH: Cleaning Errors in Discrete Computations Over CKKS. J. Cryptol. 37, Article 1 (Nov. 2023), 35 pages.","journal-title":"J. Cryptol. 37, Article 1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1007\/978-3-662-46800-5_24"},{"unstructured":"European Union. 2016. Regulation (EU) 2016\/679 of the European Parliament and of the Council of 27 April 2016 on the protection of natural persons with regard to the processing of personal data and on the free movement of such data and repealing Directive 95\/46\/EC (General Data Protection Regulation). https:\/\/eur-lex.europa.eu\/eli\/reg\/2016\/679\/oj. (2016).","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","volume-title":"Paper 2012\/144","author":"Fan Junfeng","year":"2012","unstructured":"Junfeng Fan and Frederik Vercauteren. 2012. Somewhat Practical Fully Homomorphic Encryption. Cryptology ePrint Archive, Paper 2012\/144 (2012), 144."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_21_1","DOI":"10.1145\/1536414.1536440"},{"key":"e_1_3_2_1_22_1","volume-title":"Smart","author":"Gentry Craig","year":"2012","unstructured":"Craig Gentry, Shai Halevi, and Nigel P. Smart. 2012. Homomorphic Evaluation of the AES Circuit. In CRYPTO 2012. Springer-Verlag, Berlin, Heidelberg, Article 49, 18 pages."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_23_1","DOI":"10.1007\/978-3-030-12146-4_6"},{"key":"e_1_3_2_1_24_1","volume-title":"Semi-Parallel logistic regression for GWAS on encrypted data. BMC Medical Genomics 13 (07","author":"Kim Miran","year":"2020","unstructured":"Miran Kim, Yongsoo Song, Baiyu Li, and Daniele Micciancio. 2020. Semi-Parallel logistic regression for GWAS on encrypted data. BMC Medical Genomics 13 (07 2020)."},{"key":"e_1_3_2_1_25_1","volume-title":"XBOOT: Free-XOR Gates for CKKS with Applications to Transciphering. Cryptology ePrint Archive, Paper 2025\/074.","author":"Niu Chao","year":"2025","unstructured":"Chao Niu, Zhicong Huang, Zhaomin Yang, Yi Chen, Liang Kong, Cheng Hong, and Tao Wei. 2025. XBOOT: Free-XOR Gates for CKKS with Applications to Transciphering. Cryptology ePrint Archive, Paper 2025\/074. (2025)."},{"key":"e_1_3_2_1_26_1","volume-title":"Morris J. Dworkin, Elaine Barker, James Nechvatal, James Foti","author":"National Institute of Standards","year":"2001","unstructured":"National Institute of Standards, Technology (NIST), Morris J. Dworkin, Elaine Barker, James Nechvatal, James Foti, Lawrence E. Bassham, E. Roback, and James Dray Jr. 2001. Advanced Encryption Standard (AES). (2001)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.46586\/tches.v2024.i4.205-230"},{"key":"e_1_3_2_1_28_1","volume-title":"California Consumer Privacy Act of","author":"State of California. 2018.","year":"2018","unstructured":"State of California. 2018. California Consumer Privacy Act of 2018. https:\/\/oag.ca.gov\/privacy\/ccpa. (2018)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1145\/3605759.3625260"},{"key":"e_1_3_2_1_30_1","volume-title":"Fregata: Faster Homomorphic Evaluation of AES via TFHE. In Information Security","author":"Wei Benqiang","year":"2023","unstructured":"Benqiang Wei, Ruida Wang, Zhihao Li, Qinju Liu, and Xianhui Lu. 2023. Fregata: Faster Homomorphic Evaluation of AES via TFHE. In Information Security. Springer Nature Switzerland, Cham, 392--412."}],"event":{"sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"acronym":"CCS '25","name":"CCS '25: ACM SIGSAC Conference on Computer and Communications Security","location":"Taipei Taiwan"},"container-title":["Proceedings of the 13th Workshop on Encrypted Computing &amp; Applied Homomorphic Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3733811.3767314","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T17:18:57Z","timestamp":1763054337000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3733811.3767314"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"references-count":30,"alternative-id":["10.1145\/3733811.3767314","10.1145\/3733811"],"URL":"https:\/\/doi.org\/10.1145\/3733811.3767314","relation":{},"subject":[],"published":{"date-parts":[[2025,10,13]]},"assertion":[{"value":"2025-10-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}